> There are two uses for a protocol similar to DKIM/ADSP.
>
> #1: it can be used as one of many general mailbox decluttering weapons,
> reducing the amount of "bad mail" of various sorts that the end recipient
> has to sort through with his own eyes.
>
> #2: it can be used to stop phishes from being successful, by preventing
> gullible users from even seeing them.

I fear the wishful thinking problem has arisen here.  DKIM simply allows 
someone in the mail path to attach a domain identity to a message.  It 
doesn't reduce "bad mail", or does it stop phishes.  As I noted before 
it's only useful insofar as you can use the signing domain identity to 
sort the messages.

In the near term, its most likely utility is to whitelist mail from 
signers you trust, either ones you know directly, or ones published by a 
credible third party via VBR.

> The immediate responses I'm getting in this thread suggest the intended
> mission of DKIM is #1.

Nope.

Regards,
John Levine, [email protected], Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to